ISSN 1000-1239 CN 11-1777/TP

计算机研究与发展 ›› 2015, Vol. 52 ›› Issue (10): 2247-2257.doi: 10.7544/issn1000-1239.2015.20150763

所属专题: 2015网络安全与隐私保护研究进展

• 信息安全 • 上一篇    下一篇



  1. (山东大学计算机科学与技术学院 济南 250101) (
  • 出版日期: 2015-10-01
  • 基金资助: 

Advances in Key Techniques of Practical Secure Multi-Party Computation

Jiang Han, Xu Qiuliang   

  1. (School of Computer Science and Technology, Shandong University, Jinan 250101)
  • Online: 2015-10-01

摘要: 在安全多方计算协议中,2个或多个持有秘密输入的参与方想要利用他们的输入来计算某个联合函数,并达到隐私性、正确性及输入无关性等安全要求.安全多方计算既是安全协议的一般性基础研究,也在许多应用领域(比如电子投票、网上合同签署、隐私信息检索等)有明确应用背景,其研究为密码学多个领域提供了核心工具.近年来,安全多方计算协议的研究,特别是在实用化技术方面取得了快速发展,协议实用化成为安全多方计算一个新的关注点.介绍了实用化安全多方计算协议研究的主要进展和成果,并重点介绍安全多方计算实用化的3个支撑性重要技术,包括混乱电路优化、剪切-选择技术及不经意传输扩展技术,这些技术在不同的方面显著提高了安全多方计算协议的效率.

关键词: 安全多方计算, 混乱电路优化, 剪切-选择, 不经意传输扩展, 半诚实敌手, 恶意敌手

Abstract: In the setting of secure multi-party computation, two or more parties with private inputs wish to compute some joint function of their inputs and achieve the security requirements of privacy, correctness, independence of inputs and more. Secure multi-party computation is not only the general basic research of secure protocol, but also applied in many applications such as coin-tossing, electronic voting and private information retrieval schemes. The research of secure multi-party computation provides a central tool in many area of cryptography. In recent years,secure multi-party computation has been advancing in leaps and bounds, especially in the practical techniques; the practical technology becomes a new attractive field in secure multi-party computation. In this paper, we introduce the main advances and results of practical secure multi-party computation, and focus on three major supporting techniques, which include garbled circuits optimization, cut-and-choose technique and oblivious transfer extension.These techniques significantly improve the efficiency of secure multi-party computation in different aspects.

Key words: secure multi-party computation, garbled circuits optimization, cut-and-choose, oblivious transfer extensions, semi-honest adversaries, malicious adversaries